Sometimes it is hard to find the right answer to your question in the vast amount of documentation on our cloud services out there. One of the questions I often get is, which keys are used where, how they are protected and why.
This is documented but all over the place (and not always consistently). While we are working on that for Office 365, there is a website for Azure, which might be interesting for you. It is called Common security attributes for Azure services and gives an overview over all the Azure services and security attributes in the following areas
- Network segmentation
- Identity and access management support
- Audit trail
- Access controls (if used)
- Configuration management (if used)
Now, before you go there: This is work in process and currently “only” hosts a set of the first four ring 0 services but more will be coming.